Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vda-linux
Vda-linux busybox Mirror |
|
| Vendors & Products |
Vda-linux
Vda-linux busybox Mirror |
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | BusyBox before commit 42202bf contains a heap buffer overflow vulnerability in the DHCPv6 client (udhcpc6) DNS_SERVERS option handler in networking/udhcp/d6_dhcpc.c that allows network-adjacent attackers to trigger memory corruption by sending a crafted DHCPv6 response with a malformed D6_OPT_DNS_SERVERS option. Attackers can exploit incorrect heap buffer allocation calculations in the option_to_env() function to cause denial of service or achieve arbitrary code execution on embedded systems without heap hardening. | |
| Title | BusyBox DHCPv6 Client Heap Buffer Overflow via DNS_SERVERS | |
| Weaknesses | CWE-122 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-06T13:46:42.699Z
Reserved: 2026-03-03T16:42:01.012Z
Link: CVE-2026-29004
Updated: 2026-05-06T13:46:35.554Z
Status : Awaiting Analysis
Published: 2026-05-04T18:16:26.523
Modified: 2026-05-06T14:16:07.860
Link: CVE-2026-29004
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:22:43Z